Design and security of corporate network infrastructures

Assignment Help Computer Networking
Reference no: EM131000067

You are a well-known expert in the design and security of corporate network infrastructures. As such, Z Corporation, Inc. (ZCorp) has contacted you and is requesting a proposal for a network infrastructure integration design. ZCorp is a global financial institution that intends to add Internet Protocol version 6 (IPv6) to its existing network. The headquarters of ZCorp is in Denver, CO and it also has main offices in Sydney, Australia, Vienna, Austria, Tokyo, Japan, and Rio de Janeiro, Brazil. Local routers are providing network services such as Dynamic Host Configuration Protocol (DHCP), network address translation (NAT), and Domain Name System (DNS). It is using Enhanced Interior Gateway Routing Protocol (EIGRP) as its interior gateway protocol and Exterior Gateway Protocol (EGP) as its exterior gateway protocol. Its wide area network (WAN) involves multiple T3 connections and the use of Asynchronous Transfer Mode (ATM). It is unclear to the ZCorp information technology (IT) staff whether they should replace Internet Protocol version 4 (IPv4) with IPv6 or use both versions of IP (dual-stack operation).

Your mission is to prepare a proposal document that makes a recommendation for either replacing IPv4 with IPv6 or using both version of IP. This recommendation must be supported and explained in detail.

Your proposal should specify a phased approach for your recommendation. You should include the following considerations in your document:

• The benefits of implementing IPv6, especially in the area of security

• Potential issues and concerns

• Whether or not to continue the use of network services

• Necessary changes to existing hardware

• Other resource factors

• Implementation plan

Reference no: EM131000067

Questions Cloud

Determining the service and manufacturing industries : Do you think transaction processing systems differ significantly between service and manufacturing industries? Are they equally important to both sectors?
Inventory transactions at both cost and retail : Estimate the 2011 and 2012 ending inventory and cost of goods sold using the dollar-value LIFO retail inventory method.
Find the energy delivered by each battery : Determine the current in each branch of the circuit. Find the energy delivered by each battery. Find the energy delivered to each resistor. Identify the type of energy storage transformation that occurs in the operation of the circuit.
Vulnerabilities in our food and agriculture infrastructures : Terrorist attacks have been focused on commercial aviation since the 1970s. A number of significant international conventions related to terrorism have been developed over the last sixty years
Design and security of corporate network infrastructures : You are a well-known expert in the design and security of corporate network infrastructures. As such, Z Corporation, Inc. (ZCorp) has contacted you and is requesting a proposal for a network infrastructure integration design. The benefits of imple..
What price should you charge for a gallon of ice cream : Assume that the cost of producing ice cream is $1.20 per gallon. You estimate that you can sell 1,000 gallons per month. If you want to earn revenue of $2,500 per month, what price should you charge for a gallon of ice cream? Assume that your estimat..
Define the enterprise resources into tangible and intangible : Define the enterprise resources into tangible and intangible and include under the latter they include certain resources such as brand names and technical patents.
Amount of cash received from the sale : If $3,000,000 of 10% bonds are issued at 95, the amount of cash received from the sale is
Sell in order to earn positive accounting profits : Tara is considering leaving her current job, which pays $85,000 per year, to start a new company that manufactures a line of special pens for personal digital assistants. Suppose that Tara is not completely confident in her sales estimates. Assuming ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Comparison of pptp, l2tp and sstp

Provide a brief comparison of PPTP, L2TP and SSTP, outlining the advantages and disadvantages of each. Which organizations might choose to implement a VPN service hosted on a Windows Server 2012 system?

  Snmp securitybullsnmpv1 is the most commonly used version

snmp securitybullsnmpv1 is the most commonly used version of snmp even though it provides little support for security.

  Which is the minimum water temperature of a dolphin of 2

thermal analysis of aquatic mammal such as a dolphin can provide insights into naturally occurring size distribution.

  Explain why tcp implements a three-way handshake

In addition, explain why TCP implements a 3-way handshake for connection establishment. Is 2-way insufficient? Does 4-way add more reliability? Make sure to use your own graphic illustration to support your input

  Cross-functional challenges in the mobile division

Cross-Functional Challenges in the Mobile Division

  Difference between authentication and authorization

What is multiplexing? How does this increase the bandwidth of a connection? What is the difference between authentication and authorization

  Discuss the pros and cons

Per the text, with Server 2012, the option for policy based IP address assignment is available. Discuss the pros and cons of using policy based assignments to segregate mobile devices from the other machines on the network

  About network address

ou work at XYZ company that needs to break its network address 172.16.0.0 into 5 sub-networks using Cisco routers 2621...

  Based on the kramer 2013 article what are the merits and

based on the kramer 2013 article what are the advantages and disadvantages of a content delivery network cdn? if you

  Find some way to understand the principles

Can we find some way to understand the principles by which our network is classifying handwritten digits? And, given such principles, can we do better?

  Geolocation data and customer data

Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system

  Describe the impact that each standards organization

The networking field, to include wireless networking, defines many standards to govern network and wireless network operations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd